last executing test programs: 4.24789098s ago: executing program 1 (id=2): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000080)=0x6, 0x8) 2.976950551s ago: executing program 0 (id=1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) close(r1) 1.945042183s ago: executing program 1 (id=3): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x48ce, &(0x7f0000000140)={0x0, 0x5e99, 0x3000, 0x3, 0x19a}, &(0x7f0000000040), &(0x7f00000000c0)) r3 = epoll_create1(0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/wakeup_count', 0x141000, 0x20) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000200)={0xa0000019}) finit_module(r4, 0x0, 0x3) ppoll(&(0x7f00000001c0)=[{r2, 0x20}], 0x1, 0x0, 0x0, 0x0) 382.964425ms ago: executing program 0 (id=4): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x4, 0x4) 0s ago: executing program 0 (id=5): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8401, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:58864' (ED25519) to the list of known hosts. [ 234.322203][ T30] audit: type=1400 audit(233.720:46): avc: denied { name_bind } for pid=3314 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 234.953296][ T30] audit: type=1400 audit(234.350:47): avc: denied { execute } for pid=3315 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 234.965934][ T30] audit: type=1400 audit(234.360:48): avc: denied { execute_no_trans } for pid=3315 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 242.029774][ T30] audit: type=1400 audit(241.420:49): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 242.051358][ T30] audit: type=1400 audit(241.450:50): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 242.115206][ T3315] cgroup: Unknown subsys name 'net' [ 242.157672][ T30] audit: type=1400 audit(241.550:51): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 242.479051][ T3315] cgroup: Unknown subsys name 'cpuset' [ 242.543582][ T3315] cgroup: Unknown subsys name 'rlimit' [ 242.934394][ T30] audit: type=1400 audit(242.330:52): avc: denied { setattr } for pid=3315 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 242.944951][ T30] audit: type=1400 audit(242.340:53): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 242.952988][ T30] audit: type=1400 audit(242.350:54): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 243.719519][ T3317] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 243.734011][ T30] audit: type=1400 audit(243.120:55): avc: denied { relabelto } for pid=3317 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 243.749288][ T30] audit: type=1400 audit(243.140:56): avc: denied { write } for pid=3317 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 243.895120][ T30] audit: type=1400 audit(243.290:57): avc: denied { read } for pid=3315 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 243.901701][ T30] audit: type=1400 audit(243.290:58): avc: denied { open } for pid=3315 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 243.941420][ T3315] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 278.718504][ T30] audit: type=1400 audit(278.110:59): avc: denied { execmem } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 278.843949][ T30] audit: type=1400 audit(278.240:60): avc: denied { read } for pid=3320 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 278.857843][ T30] audit: type=1400 audit(278.250:61): avc: denied { open } for pid=3320 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 278.884832][ T30] audit: type=1400 audit(278.280:62): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 278.953580][ T30] audit: type=1400 audit(278.350:63): avc: denied { module_request } for pid=3321 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 279.242376][ T30] audit: type=1400 audit(278.640:64): avc: denied { sys_module } for pid=3321 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 287.598672][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.721143][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.652419][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.754171][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.977909][ T3321] hsr_slave_0: entered promiscuous mode [ 291.984688][ T3321] hsr_slave_1: entered promiscuous mode [ 292.611189][ T3320] hsr_slave_0: entered promiscuous mode [ 292.629111][ T3320] hsr_slave_1: entered promiscuous mode [ 292.638042][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 292.640094][ T3320] Cannot create hsr debugfs directory [ 295.382011][ T30] audit: type=1400 audit(294.780:65): avc: denied { create } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.389831][ T30] audit: type=1400 audit(294.790:66): avc: denied { write } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.414748][ T30] audit: type=1400 audit(294.810:67): avc: denied { read } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.460596][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 295.555890][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 295.683236][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 295.726443][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 296.322896][ T3320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 296.405329][ T3320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 296.459712][ T3320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 296.542664][ T3320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 300.459897][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.855687][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.550533][ T3321] veth0_vlan: entered promiscuous mode [ 313.625000][ T3321] veth1_vlan: entered promiscuous mode [ 314.035370][ T3321] veth0_macvtap: entered promiscuous mode [ 314.081795][ T3321] veth1_macvtap: entered promiscuous mode [ 314.570350][ T2120] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.612376][ T2120] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.618485][ T2120] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.622344][ T2120] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.892062][ T3320] veth0_vlan: entered promiscuous mode [ 315.192338][ T3320] veth1_vlan: entered promiscuous mode [ 315.369493][ T30] audit: type=1400 audit(314.760:68): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 315.442790][ T30] audit: type=1400 audit(314.840:69): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.qVPhYN/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 315.495742][ T30] audit: type=1400 audit(314.890:70): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 315.554119][ T30] audit: type=1400 audit(314.950:71): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.qVPhYN/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 315.579082][ T30] audit: type=1400 audit(314.970:72): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.qVPhYN/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4414 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 315.670089][ T30] audit: type=1400 audit(315.070:73): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 315.711137][ T30] audit: type=1400 audit(315.100:74): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 315.736495][ T30] audit: type=1400 audit(315.120:75): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="gadgetfs" ino=4415 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 315.771930][ T3320] veth0_macvtap: entered promiscuous mode [ 315.773856][ T30] audit: type=1400 audit(315.170:76): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 315.828829][ T30] audit: type=1400 audit(315.220:77): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 315.885646][ T3320] veth1_macvtap: entered promiscuous mode [ 316.296256][ T3321] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 316.505555][ T982] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.509159][ T982] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.511985][ T982] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.522712][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.562009][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 320.562650][ T30] audit: type=1400 audit(319.960:96): avc: denied { create } for pid=3480 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 320.589419][ T30] audit: type=1400 audit(319.990:97): avc: denied { setopt } for pid=3480 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 320.882177][ T3483] ------------[ cut here ]------------ [ 320.882652][ T3483] verifier bug: not inlined functions bpf_perf_event_read#22 is missing func(1) [ 320.889759][ T3483] WARNING: CPU: 1 PID: 3483 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 320.892481][ T3483] Modules linked in: [ 320.893535][ T3483] CPU: 1 UID: 0 PID: 3483 Comm: syz.0.5 Not tainted syzkaller #0 PREEMPT [ 320.895570][ T3483] Hardware name: linux,dummy-virt (DT) [ 320.896668][ T3483] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 320.897409][ T3483] pc : do_misc_fixups+0xa938/0xcf04 [ 320.897822][ T3483] lr : do_misc_fixups+0xa938/0xcf04 [ 320.898418][ T3483] sp : ffff8000a1807450 [ 320.898792][ T3483] x29: ffff8000a1807450 x28: ffff000020f98000 x27: ffff000020f9e130 [ 320.899654][ T3483] x26: ffff000020f9e148 x25: ffff000020f98000 x24: 0000000000000000 [ 320.900366][ T3483] x23: ffff000020f9e128 x22: 1ffff00011ad5a13 x21: ffff80008d6ad098 [ 320.901009][ T3483] x20: ffff800085584000 x19: ffff80008556d6a0 x18: 0000000000000000 [ 320.901650][ T3483] x17: 0000000000000000 x16: ffff00006a0ad4c4 x15: 0000000000000000 [ 320.902349][ T3483] x14: 0000000000000000 x13: 0000000000000000 x12: ffff700014300df3 [ 320.903026][ T3483] x11: 1ffff00014300df2 x10: ffff700014300df2 x9 : dfff800000000000 [ 320.903806][ T3483] x8 : ffff8000a1806f98 x7 : ffff8000a18070c0 x6 : ffff8000a1807010 [ 320.904419][ T3483] x5 : ffff8000a1806ff8 x4 : 0000000000000000 x3 : 1fffe0000d41773e [ 320.905019][ T3483] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000011f19e40 [ 320.905813][ T3483] Call trace: [ 320.906415][ T3483] do_misc_fixups+0xa938/0xcf04 (P) [ 320.907219][ T3483] bpf_check+0x3c84/0x9508 [ 320.907700][ T3483] bpf_prog_load+0xe2c/0x1b74 [ 320.908163][ T3483] __sys_bpf+0x9c4/0x29c8 [ 320.908519][ T3483] __arm64_sys_bpf+0x70/0xa4 [ 320.908879][ T3483] invoke_syscall+0x6c/0x258 [ 320.909236][ T3483] el0_svc_common.constprop.0+0xac/0x230 [ 320.909642][ T3483] do_el0_svc+0x40/0x58 [ 320.909968][ T3483] el0_svc+0x50/0x1a0 [ 320.910415][ T3483] el0t_64_sync_handler+0xa0/0xe4 [ 320.910885][ T3483] el0t_64_sync+0x198/0x19c [ 320.911760][ T3483] irq event stamp: 552 [ 320.912083][ T3483] hardirqs last enabled at (551): [] finish_task_switch.isra.0+0x1a8/0x854 [ 320.912744][ T3483] hardirqs last disabled at (552): [] el1_brk64+0x1c/0x48 [ 320.913283][ T3483] softirqs last enabled at (504): [] handle_softirqs+0x88c/0xdb4 [ 320.913938][ T3483] softirqs last disabled at (497): [] __do_softirq+0x14/0x20 [ 320.914660][ T3483] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 323.124026][ T982] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.484846][ T982] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.812549][ T982] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 324.080644][ T982] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 324.770776][ T30] audit: type=1400 audit(324.170:98): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 326.818986][ T982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 326.907590][ T982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 326.984633][ T982] bond0 (unregistering): Released all slaves [ 327.440228][ T982] hsr_slave_0: left promiscuous mode [ 327.464277][ T982] hsr_slave_1: left promiscuous mode [ 327.600143][ T982] veth1_macvtap: left promiscuous mode [ 327.604529][ T982] veth0_macvtap: left promiscuous mode [ 327.615054][ T982] veth1_vlan: left promiscuous mode [ 327.621801][ T982] veth0_vlan: left promiscuous mode [ 334.576618][ T982] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.843729][ T982] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.039181][ T982] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.314091][ T982] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.262620][ T982] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 338.372134][ T982] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 338.422771][ T982] bond0 (unregistering): Released all slaves [ 338.882742][ T982] hsr_slave_0: left promiscuous mode [ 338.892706][ T982] hsr_slave_1: left promiscuous mode [ 339.056529][ T982] veth1_macvtap: left promiscuous mode [ 339.060551][ T982] veth0_macvtap: left promiscuous mode [ 339.062824][ T982] veth1_vlan: left promiscuous mode [ 339.064268][ T982] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 12:02:02 Registers: info registers vcpu 0 CPU#0 PC=ffff800084acc100 X00=ffff80008d480d70 X01=0000000000000008 X02=0000000000000000 X03=1fffe0000242d791 X04=000000000000ffff X05=1fffe0000365cc41 X06=ffff700010000d2a X07=ffff00001b2e6208 X08=ffff00001216bc80 X09=dfff800000000000 X10=ffff00001216c710 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=1fffe00003accacd X15=ffff00001fc23500 X16=0000000000000000 X17=1fffe00003acc9e0 X18=ffff00001fc23510 X19=0000000000000001 X20=ffff80008d4809c0 X21=ffff800086ad0758 X22=1ffff00010000d2a X23=ffff00000f052200 X24=0000000000000000 X25=dfff800000000000 X26=ffff8000810ba450 X27=ffff00001d664c80 X28=1fffe0000365cc41 X29=ffff800080006840 X30=ffff80008513eeb0 SP=ffff800080006860 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=7369203232236461:65725f746e657665 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=6f6974636e756620:64656e696c6e6920 Q06=6e75662064656e69:6c6e6920746f6e20 Q07=5f667265705f6670:6220736e6f697463 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc82b09a0:0000ffffc82b09a0 Q17=ffffff80ffffffd0:0000ffffc82b0970 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085443f54 X00=ffff800085443f50 X01=0000000000000000 X02=0000000000000000 X03=1fffe000023e33c9 X04=ffff8000a1806e40 X05=ffff700014300d94 X06=ffff000011f19e40 X07=00000000f2f2f2f2 X08=00000000f3f3f300 X09=00000000f2000000 X10=00000000f204f204 X11=1ffff00010e363ac X12=ffff700010e363ad X13=0000000000000001 X14=6f4e20352e302e7a X15=65746e6961742074 X16=6c616b7a79732064 X17=502030232072656c X18=0000000000000000 X19=ffff8000873536b0 X20=ffff000011f19e40 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800087353680 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873536b0 X28=1fffe0000d415ab5 X29=ffff8000a1806b90 X30=ffff800080438d74 SP=ffff8000a1806b90 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0a0a0a0a0a0a0a0a:0a0a0a0a0a0a0a0a Q01=64617379733a725f:0000293128636e75 Q02=7369203232236461:65725f746e657665 Q03=0000000000000000:ffff000000000000 Q04=0000000000000000:00000000ff000000 Q05=705f66706220736e:6f6974636e756620 Q06=6e75662064656e69:6c6e6920746f6e20 Q07=5f667265705f6670:6220736e6f697463 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffce0eddd0:0000ffffce0eddd0 Q17=ffffff80ffffffd8:0000ffffce0edda0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000